Skip to content

Commit 80c1328

Browse files
committed
Updated PS syntax + Acrolinx scrub.
1 parent 14bb635 commit 80c1328

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

azure-local/manage/manage-security-post-upgrade.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 02/03/2025
8+
ms.date: 02/18/2025
99
---
1010

1111
# Manage security after upgrading Azure Local
@@ -41,31 +41,31 @@ Each of these steps is described in detail in the following sections.
4141
A new deployment of Azure Local introduces two baselines documents injected by the security management layer, while the upgraded cluster doesn't.
4242

4343
> [!IMPORTANT]
44-
> After applying the security baseline documents, a new mechanism is used to apply and maintain the [Security baseline settings](https://aka.ms/hci-securitybase).
44+
> After you apply the security baseline documents, a new mechanism is used to apply and maintain [Security baseline settings](https://aka.ms/hci-securitybase).
4545
4646
1. If your servers inherit baseline settings through mechanisms such as GPO, DSC, or scripts, we recommend that you:
4747

4848
- Remove these duplicate settings from such mechanisms.
49-
- Alternatively, after applying the security baseline, [Disable the drift control mechanism](./manage-secure-baseline.md).
49+
- Alternatively, after you apply the security baseline, [Disable the drift control mechanism](./manage-secure-baseline.md).
5050

51-
The new security posture of your servers will combine the previous settings, the new settings, and the overlapping settings with updated values.
51+
The new security posture of your servers combines previous settings, new settings, and overlapping settings with updated values.
5252

5353
> [!NOTE]
54-
> Microsoft tests and vaildates the Azure Local security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with the new product scenarios, and could require extensive testing and troubleshooting on your part.
54+
> Microsoft tests and vaildates the Azure Local security settings. We strongly recommend that you keep these settings. Use of custom settings can potentially lead to system instability, incompatibility with new product scenarios, and could require extensive testing and troubleshooting on your part.
5555
56-
1. When running the followign commands, you'll find the documents aren't in place. These cmdlets won't return any output.
56+
1. When running the following commands, you'll find the documents aren't in place. These cmdlets won't return any output.
5757

58-
```powershell
59-
Get-AzSSecuritySettingsConfiguration
60-
Get-AzSSecuredCoreConfiguration
61-
```
58+
```powershell
59+
Get-ASOSConfigSecuredCoreDoc
60+
Get-ASOSConfigSecuritySettingsDoc
61+
```
6262

6363
1. To enable the baselines, go to each of the nodes you upgraded. Run the following commands locally or remotely using a privileged administrator account:
6464

65-
```powershell
66-
Start-AzSSecuritySettingsConfiguration
67-
Start-AzSSecuredCoreConfiguration
68-
```
65+
```powershell
66+
Start-AzSSecuritySettingsConfiguration
67+
Start-AzSSecuredCoreConfiguration
68+
```
6969

7070
1. Reboot the nodes in a proper sequence for the new settings to become effective.
7171

@@ -78,9 +78,9 @@ Get-AzSSecuritySettingsConfiguration
7878
Get-AzSSecuredCoreConfiguration
7979
```
8080

81-
You'll get an output for each cmdlet with the baseline information.
81+
You get an output for each cmdlet with baseline information.
8282

83-
Here is an example of the baseline output:
83+
Here's an example of the baseline output:
8484

8585
```powershell
8686
OsConfiguration": {
@@ -108,7 +108,7 @@ If you need to enable BitLocker on any of your volumes, see [Manage BitLocker en
108108

109109
Application control for business (formerly known as Windows Defender Application Control or WDAC) provides a great layer of defense against running untrusted code.
110110

111-
After you upgrade your system, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing third party software already existing on the servers.
111+
After you upgrade your system, consider enabling Application Control. This can be disruptive if the necessary measures aren't taken for proper validation of existing non-Microsoft software already existing on the servers.
112112

113113
For new deployments, Application Control is enabled in *Enforced* mode (blocking nontrusted binaries), whereas for upgraded systems we recommend that you follow these steps:
114114

@@ -118,7 +118,7 @@ For new deployments, Application Control is enabled in *Enforced* mode (blocking
118118
1. Repeat steps #2 and #3 as necessary until no further audit events are observed. Switch to *Enforced* mode.
119119

120120
> [!WARNING]
121-
> Failure to create the necessary AppControl policies to enable additional third party software will prevent that software from running.
121+
> Failure to create the necessary AppControl policies to enable non-Microsoft software may prevent that software from running.
122122
123123
For instructions to enable in *Enforced* mode, see [Manage Windows Defender Application Control for Azure Local](./manage-wdac.md#switch-application-control-policy-modes).
124124

0 commit comments

Comments
 (0)